Our free Certified Ethical Hacker Exam Study Guide has been one of our most popular white paper and resources items on our website for years now. We wanted to keep everyone updated with the fact that we recently updated it

Christian R. Crank, a security researcher and instructor for us recently created this video on a phishing attack using Meterpreter and Ettercap. This is a lab that students perform in our Certified Ethical Hacker class. Enjoy!

According to statistics provided by GO-Gulf.com, the cost of cyber crime will top $100 billion this year. Cyber crime affects 18 victims per second for a total of around 556 million victims per year. Just recently, the FBI warned that cyber attacks have eclipsed domestic terrorism as the primary threat to U.S. security.

Being a certified ethical hacker is an in-demand career. While relatively new, the need for it can't be underestimated. These are the people who can beat unethical hackers, because they know the things those hackers know and can think like them. There are now classes around the world that will teach you to become a certified ethical hacker. Once you're certified, you can get a job with almost any company that uses technology that is prone to hacking. To become certified, however, you have to pass a certification exam at the end of your training course.

Certified Ethical Hackers (CEH) can be very beneficial for companies. By applying their training as hackers for the good of organizations, they can help test firewall systems as well as other network security features to find vulnerabilities. This knowledge can then be used to help people withstand real attacks from others with nefarious motives.

Want an inside look at the new content we've added to our Certified Ethical Hacker (CEH) training course? Then make sure you check out our lab demonstration video on Process Injection using Metasploit Framework and Syringe! In the video, Christian Crank, Penetration Testing Subject Matter Expert from TrainACE's Advanced Security branch, demonstrates how to use Metasploit Framework and Syringe to avoid IDS/IPS and antiviruses in order to successfully create a command shell. The video breaks down how to prevent a failed process injection in order to fight back against damaging malicious code using accessible tools that every certified ethical hacker can master.

EC-Council has just announced that a much overdue improvement and version upgrade to the ECSA / LPT curriculum will be coming to training centers (ours, of course, is the only one that matters) at the beginning of 2014.

Social networks are social by design. They mean to foster interaction, to put you in touch in one way or another. Some put you in touch with friends and family. Others put you out there for the whole wide world to see. Some uses are personal. Others are all business. In the end, though, social media platforms are all designed to be easy to access and easy to use. They’re intentionally informal. They’re the last place you’d expect to find classified intelligence or the kind of business secrets that companies diligently guard.

Criminals have been breaking into websites and electronic databases for many years. Although this can result in huge monetary losses, it rarely injures anyone or causes physical damage. However, hackers are gaining more destructive power as manufacturers add network interfaces and microprocessors to mechanical devices. This is a security threat that we cannot afford to ignore.

Most people who are looking in to taking the Certified Ethical Hacker (CEH) certification training with us want to know a few key points. The CEH certification is arguably the leading baseline penetration testing certification on the market. Our CEH training class prepares people for a career in the field by offering more hands-on training than any other competitor’s class out there. The class also has a pass rate on the certification exam OVER 99% (yes that’s correct, in the last year, about 550 people took the CEH with us and only 5 failed the exam). As you probably know, we offer classroom based training as well as online options, both are extremely effective.